首页    期刊浏览 2024年12月03日 星期二
登录注册

文章基本信息

  • 标题:Blind Turing-Machines: Arbitrary Private Computations from Group Homomorphic Encryption
  • 本地全文:下载
  • 作者:Stefan Rass
  • 期刊名称:International Journal of Advanced Computer Science and Applications(IJACSA)
  • 印刷版ISSN:2158-107X
  • 电子版ISSN:2156-5570
  • 出版年度:2013
  • 卷号:4
  • 期号:11
  • DOI:10.14569/IJACSA.2013.041107
  • 出版社:Science and Information Society (SAI)
  • 摘要:Secure function evaluation (SFE) is the process of computing a function (or running an algorithm) on some data, while keeping the input, output and intermediate results hidden from the environment in which the function is evaluated. This can be done using fully homomorphic encryption, Yao's garbled circuits or secure multiparty computation. Applications are manifold, most prominently the outsourcing of computations to cloud service providers, where data is to be manipulated and processed in full confidentiality. Today, one of the most intensively studied solutions to SFE is fully homomorphic encryption (FHE). Ever since the first such systems have been discovered in 2009, and despite much progress, FHE still remains inefficient and difficult to implement practically. Similar concerns apply to garbled circuits and (generic) multiparty computation protocols. In this work, we introduce the concept of a blind Turing-machine, which uses simple homomorphic encryption (an extension of ElGamal encryption) to process ciphertexts in the way as standard Turing-machines do, thus achieving computability of any function in total privacy. Remarkably, this shows that fully homomorphic encryption is indeed an overly strong primitive to do SFE, as group homomorphic encryption with equality check is already sufficient. Moreover, the technique is easy to implement and perhaps opens the door to efficient private computations on nowadays computing machinery, requiring only simple changes to well-established computer architectures.
  • 关键词:thesai; IJACSA; thesai.org; journal; IJACSA papers; secure function evaluation; homomorphic encryption; chosen ciphertext security; cloud computing
国家哲学社会科学文献中心版权所有